Prioritising security vulnerabilities in ports

Ports are exposed to various risks in their internal operations and external interactions with inland transport carriers and sea-going vessels within maritime logistics systems. While conventional safety management techniques may be capable of dealing with accidental, hazard-based risks in port, new vulnerability analysis methods are urgently required for tackling those caused by threats such as terrorist attacks. The motivation for identifying the vulnerabilities is the need for prioritising activities and resources on port security investments and risk reduction processes. This paper develops an advanced threat-based criticality analysis methodology designed for the identification and prioritisation of vulnerable port facilities under uncertainties. The model relies on the combination of fuzzy Bayesian reasoning and analytical hierarchy process (AHP) analysis in a complementary way so as to facilitate the treatment of uncertainty in data, thus realising effective quantitative analysis of the vulnerabilities under different threat modes in ports. The outcomes can be used either as a stand-alone technique for prioritising critical systems such as port facilitates with high values and significant functions or as part of an integrated decision making method for evaluating the effectiveness of security control options.

[1]  Todd Masse,et al.  The Department of Homeland Security's Risk Assessment Methodology: Evolution, Issues, and Options for Congress , 2007 .

[2]  Robin L Dillon,et al.  Risk‐Based Decision Making for Terrorism Applications , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[3]  Luis Martínez-López,et al.  Self-tuning of fuzzy belief rule bases for engineering system safety analysis , 2008, Ann. Oper. Res..

[4]  Jin Wang,et al.  Fuzzy Rule-Based Bayesian Reasoning Approach for Prioritization of Failures in FMEA , 2008, IEEE Transactions on Reliability.

[5]  Sandro Bologna,et al.  Safeguarding information intensive critical infrastructures against novel types of emerging failures , 2007, Reliab. Eng. Syst. Saf..

[6]  Tom Petersen,et al.  Importance and Exposure in Road Network Vulnerability Analysis , 2006 .

[7]  Kristian G. Olesen,et al.  HUGIN - a Shell for Building Belief Universes for Expert Systems , 1989, IJCAI 1989.

[8]  Seth D. Guikema,et al.  Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .

[9]  S Bonsall,et al.  Use of Fuzzy Evidential Reasoning in Maritime Security Assessment , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[10]  Jin Wang,et al.  The application of the Six Sigma concept to port security process quality control , 2007, Qual. Reliab. Eng. Int..

[11]  Hong-Zhong Huang,et al.  Bayesian reliability analysis for fuzzy lifetime data , 2006, Fuzzy Sets Syst..

[12]  A. G. Eleye-Datubo,et al.  Marine and Offshore Safety Assessment by Incorporative Risk Modeling in a Fuzzy‐Bayesian Network of an Induced Mass Assignment Paradigm , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[13]  Terje Aven,et al.  Identification of safety and security critical systems and activities , 2009, Reliab. Eng. Syst. Saf..

[14]  Jukka Hallikas,et al.  Origin and Impact of Supply Chain Risks Affecting Supply Security , 2012 .

[15]  Detlof von Winterfeldt,et al.  Meeting the Challenges of Terrorism Risk Analysis , 2007 .

[16]  Massimo Marchiori,et al.  Vulnerability and protection of infrastructure networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[17]  Vicki M. Bier,et al.  Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .

[18]  George E. Apostolakis,et al.  Identification of critical locations across multiple infrastructures for terrorist actions , 2007, Reliab. Eng. Syst. Saf..

[19]  Adrian V. Gheorghe,et al.  Critical Infrastructures at Risk , 2006 .

[20]  Henry H. Willis Guiding Resource Allocations Based on Terrorism Risk , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[21]  Chris W. Johnson Understanding the interaction between public policy, managerial decision-making and the engineering of critical infrastructures , 2007, Reliab. Eng. Syst. Saf..

[22]  Martin J. Alperen The Department of Homeland Security , 2011 .

[23]  Adolf K.Y. Ng,et al.  The Evolution and Research Trends of Port Geography , 2013 .

[24]  Girish Gujar,et al.  Port security in asia , 2013 .

[25]  Henrik Jönsson,et al.  Identifying Critical Components in Electric Power Systems: A Network Analytic Approach , 2007 .

[26]  B John Garrick Perspectives on the use of risk assessment to address terrorism. , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[27]  Adolf K.Y. Ng,et al.  Port Security: The ISPS Code , 2012 .

[28]  Roger Stough,et al.  The Revenge of Distance: Vulnerability Analysis of Critical Information Infrastructure , 2003, cond-mat/0310427.

[29]  Kai-Chieh Hu,et al.  Evaluation of the service quality of container ports by importance-performance analysis , 2012 .

[30]  Terje Aven,et al.  A unified framework for risk and vulnerability analysis covering both safety and security , 2007, IEEE Engineering Management Review.

[31]  Jin Wang,et al.  Technology and Safety of Marine Systems , 2003 .

[32]  M. van der Borst,et al.  An overview of PSA importance measures , 2001, Reliab. Eng. Syst. Saf..

[33]  Bilal M Ayyub,et al.  Critical Asset and Portfolio Risk Analysis: An All‐Hazards Framework , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[34]  Chin-Shan Lu,et al.  The effect of safety management on perceived safety performance in container stevedoring operations , 2011 .